1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lerok [7]
2 years ago
11

Sampson runs his own online business, and much of his success depends on the reliability and accuracy of various online data. Ho

w does integrity help to ensure that Sampson can trust the online data he is using?
A.
Integrity takes steps to ensure Sampson's information cannot be altered or deleted by unauthorized people.

B.
Integrity refers to a process that makes it impossible for anyone but Sampson to see the data that he is using.

C.
Integrity blocks all hackers from interfering with Sampson's data and what he does with it.

D.
Integrity allows Sampson to access and move data on an unsecured network.
Computers and Technology
1 answer:
Elena-2011 [213]2 years ago
6 0

Answer: because integrity takes steps to ensure Sampson's information cannot be altered or deleted by unauthorized people and that it stays intact, no matter where it goes

Explanation:

You might be interested in
which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?
Dmitry_Shevchenko [17]

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

4 0
2 years ago
Which extension is appropriate for Word document templates?
expeople1 [14]
The answer to this question is A
8 0
2 years ago
Read 2 more answers
HELP URGENTLY!!!!!
Ganezh [65]
Which field TCP header is not typically used in modern networks
5 0
3 years ago
Which document lists the planned dates for performing tasks and meeting goals identified in the project plan?
Mnenie [13.5K]
<span>The document is called as Project schedule. this document contains the tasks that needs to be performed, the time that is given to the perform the task, the target dates. It also contains the budget of the project and the budget can be represented task wise. This helps in performing the project in a more organized way.</span>
5 0
2 years ago
Alt text is considered a(n ____ attribute because it provides access to everyone who visits your site.
Vikentia [17]
Alt text is considered an accessibility attribute...
8 0
3 years ago
Other questions:
  • Why would you convert your birth year to binary numbers?
    6·1 answer
  • What is the absolute pathname of the YUM configuration file? REMEMBER: An absolute pathname begins with a forward slash
    12·1 answer
  • For this assignment: Analyze and describe the network infrastructure. Describe and explain the various policies that will be nee
    11·1 answer
  • Ivy is a student. She is looking for some freelance assignments during her vacation. Which of the following networking sites can
    9·1 answer
  • ossless compression tools generally use either Huffman coding or Lempel-Ziv-Welch (LZW) coding. Discuss the advantages and disad
    8·1 answer
  • Nathan wants to create multiple worksheet containing common formatting styles for his team members. Which file extension helps h
    9·1 answer
  • What should you include in a persuasive speech
    14·1 answer
  • MyProgramming Lab
    5·1 answer
  • True or False. A Windows Server 2016 that was installed in Desktop Experience mode can be converted to Server Core mode.
    5·1 answer
  • Mechanisms that can be used to rescue accident victims
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!